메뉴 건너뛰기




Volumn 20, Issue 10, 2009, Pages 1487-1498

Securing structured overlays against identity attacks

Author keywords

Distributed systems; Overlay networks; Routing protocols; Security

Indexed keywords

APPLICATION COMPONENTS; COLLUDING ATTACK; DATA STORAGE; DETECTION AND TRACKING; DISTRIBUTED APPLICATIONS; DISTRIBUTED SYSTEMS; KEY-BASED ROUTING; MALICIOUS NODES; SECURITY; SHOPPING CARTS; STORAGE NODES; STRUCTURED OVERLAY NETWORK; STRUCTURED OVERLAYS;

EID: 70349104689     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2008.241     Document Type: Article
Times cited : (14)

References (39)
  • 2
    • 36949014918 scopus 로고    scopus 로고
    • A Study of Prex Hijacking and Interception in the Internet
    • Sept
    • H. Ballani, P. Francis, and X. Zhang, "A Study of Prex Hijacking and Interception in the Internet," Proc. ACM SIGCOMM '07, Sept. 2007.
    • (2007) Proc. ACM SIGCOMM '07
    • Ballani, H.1    Francis, P.2    Zhang, X.3
  • 3
    • 0037623983 scopus 로고    scopus 로고
    • Identity Based Encryption from the Weil Pairing
    • D. Boneh and M. Franklin, "Identity Based Encryption from the Weil Pairing," SIAM J. Computing, vol. 32, no. 3, pp. 586-615, 2003.
    • (2003) SIAM J. Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 9
    • 0038011186 scopus 로고    scopus 로고
    • A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks
    • Nov
    • E. Damiani et al., "A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks," Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), Nov. 2002.
    • (2002) Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02)
    • Damiani, E.1
  • 11
    • 30944440583 scopus 로고    scopus 로고
    • Using NTP to Control and Synchronize System Clocks,
    • Technical Report 816-1475-10, Sun Microsystems Inc, July
    • D. Deeths and G. Brunette, "Using NTP to Control and Synchronize System Clocks," Technical Report 816-1475-10, Sun Microsystems Inc., July 2001.
    • (2001)
    • Deeths, D.1    Brunette, G.2
  • 17
    • 2442425480 scopus 로고    scopus 로고
    • The Impact of DHT Routing Geometry on Resilience and Proximity
    • Sept
    • K. Gummadi et al., "The Impact of DHT Routing Geometry on Resilience and Proximity," Proc. ACM SIGCOMM '03, Sept. 2003.
    • (2003) Proc. ACM SIGCOMM '03
    • Gummadi, K.1
  • 32
    • 0039470747 scopus 로고
    • Coupon Collecting for Unequal Probabilities
    • H. von Schelling, "Coupon Collecting for Unequal Probabilities," Am. Math. Monthly, vol. 61, pp. 306-311, 1954.
    • (1954) Am. Math. Monthly , vol.61 , pp. 306-311
    • von Schelling, H.1
  • 36
    • 45749109010 scopus 로고    scopus 로고
    • Sybil-guard: Defending against Sybil Attacks via Social Networks
    • June
    • H. Yu, M. Kaminsky, P.B. Gibbons, and A.D. Flaxman, "Sybil-guard: Defending against Sybil Attacks via Social Networks," IEEE/ACM Trans. Networking, vol. 16, no. 3, pp. 576-589, June 2008.
    • (2008) IEEE/ACM Trans. Networking , vol.16 , Issue.3 , pp. 576-589
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.D.4
  • 38
    • 0003858844 scopus 로고    scopus 로고
    • Tapestry: An Infrastructure for Fault-Tolerant Wide-Area Location and Routing,
    • Technical Report CSD-01-1141, U.C. Berkeley
    • B.Y. Zhao, J.D. Kubiatowicz, and A.D. Joseph, "Tapestry: An Infrastructure for Fault-Tolerant Wide-Area Location and Routing," Technical Report CSD-01-1141, U.C. Berkeley, 2001.
    • (2001)
    • Zhao, B.Y.1    Kubiatowicz, J.D.2    Joseph, A.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.